Reference : Similarity testing for access control
Scientific journals : Article
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/26426
Similarity testing for access control
English
Bertolino, A. [Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy]
Daoudagh, S. [Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy]
El Kateb, Donia mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)]
Henard, Christopher mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) >]
Le Traon, Yves mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
Lonetti, F. [Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy]
Marchetti, E. [Istituto di Scienza e Tecnologie dell'Informazione A. Faedo, Consiglio Nazionale Delle Ricerche, via G. Moruzzi 1, Pisa, Italy]
Mouelhi, T. [Interdisciplinary Research Centre, SnT, University of Luxembourg, Luxembourg, Luxembourg]
Papadakis, Mike mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
2015
Information and Software Technology
Elsevier
58
355-372
Yes (verified by ORBilu)
International
09505849
[en] Security policies ; Similarity ; Test prioritization ; Budget control ; Fault detection ; Testing ; Access control policies ; Exhaustive testing ; Mutation analysis ; Security mechanism ; Security policy ; Similarity criteria ; Access control
[en] Context: Access control is among the most important security mechanisms, and XACML is the de facto standard for specifying, storing and deploying access control policies. Since it is critical that enforced policies are correct, policy testing must be performed in an effective way to identify potential security flaws and bugs. In practice, exhaustive testing is impossible due to budget constraints. Therefore the tests need to be prioritized so that resources are focused on their most relevant subset. Objective: This paper tackles the issue of access control test prioritization. It proposes a new approach for access control test prioritization that relies on similarity. Method: The approach has been applied to several policies and the results have been compared to random prioritization (as a baseline). To assess the different prioritization criteria, we use mutation analysis and compute the mutation scores reached by each criterion. This helps assessing the rate of fault detection. Results: The empirical results indicate that our proposed approach is effective and its rate of fault detection is higher than that of random prioritization. Conclusion: We conclude that prioritization of access control test cases can be usefully based on similarity criteria. © 2014 Elsevier B.V. All rights reserved.
http://hdl.handle.net/10993/26426
10.1016/j.infsof.2014.07.003

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
Similarity testing for access control.pdfPublisher postprint2.62 MBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.